Graphic summary
  • Show / hide key
  • Information


Scientific and technological production
  •  

1 to 26 of 26 results
  • UBIQUITOUS SECURE ELECTRONIC VOTING (u-SEV): Sistema de voto electrónico seguro para entornos sin infraestructuras de telecomunica.

     León Abarca, Olga; Muñoz Tapia, Jose Luis; Soriano Ibáñez, Miguel
    Competitive project

     Share

  • Information security group

     Forné, Jordi; Fernandez Muñoz, Marcel; Pegueroles Valles, Josep Rafel; Esparza Martin, Oscar; Muñoz Tapia, Jose Luis; Hernández Serrano, Juan Bautista; León Abarca, Olga; Aguilar Igartua, Mónica; Rebollo Monedero, David; Vera del Campo, Juan; Parra Arnau, Javier; Pallares Segarra, Esteve; Bartoli, Andrea; Soriano Ibáñez, Miguel
    Competitive project

     Share

  • Energy-efficient physical layer packet authenticator for machine-to-machine networks

     Bartoli, Andrea; Hernández Serrano, Juan Bautista; León Abarca, Olga; Kountouris, Apostolous; Barthel, Dominique
    Transactions on Emerging Telecommunications Technologies
    Vol. 24, num. 4, p. 401-412
    DOI: 10.1002/ett.2653
    Date of publication: 2013-06
    Journal article

    Read the abstract Read the abstract View View Open in new window  Share Reference managers Reference managers Open in new window

    Machine-to-machine networks are spreading over every sector of our society due to their self-organisation capabilities. In these networks, thousands of devices are left unattended for years of operation without the possibility of human intervention. In this sense, every step forward into avoiding early exhaustion of the network nodes is of paramount importance. We have introduced a novel authentication scheme that is able to discard non-intended and/or non-legitimate packets just after the reception of the physical preamble. This proposal was shown to yield enormous energy saving with regard to both node exhaustion attacks and normal network operation. In this paper, we extend that work with a novel synchronisation protocol that addresses previous desynchronisation issues. Besides, we analyse and propose the more appropriate deployment parameters that maximise the overall energy savings. We also detail the necessary key generation and key updating processes required to manage the in use keying material. Moreover, we show how to fit the proposed mechanism into the IEEE 802.15.4e amendment to the IEEE 802.15.4-2006 standard, as many companies have decide to go for this technology for the development of machine-to-machine networks

  • WiMAX-based robust localization in the presence of misbehaving and/or malicious base stations

     Hernández Serrano, Juan Bautista; León Abarca, Olga; Soriano Ibáñez, Miguel
    Computers and electrical engineering
    Vol. 39, num. 7, p. 2318-2329
    DOI: 10.1016/j.compeleceng.2013.03.006
    Date of publication: 2013-10
    Journal article

    Read the abstract Read the abstract View View Open in new window  Share Reference managers Reference managers Open in new window

    The use of WiMAX cellular networks has arisen as a promising solution in order to provide broadband access over large, often shadowed, areas. As in other cellular networks, localization of users is extremely useful for many services and even essential for some civilian and/or military logistic operations. In a cellular WiMAX network, a node can obtain its position from beacons received by several cell base stations. Therefore, securing the localization method against potential false or erroneous feedback is of paramount importance in order to allow the nodes to get reliable position estimations. This fact implies not only making the localization method robust against erroneous or forged measurements, but also identifying which WiMAX base stations are providing such measurements. In this paper, we propose a robust localization method that can identify up to k malicious or misbehaving base stations and provide with an accurate estimation of the node position even in their presence. Simulation results prove that this proposal outperforms other existing detection techniques.

  • UBIQUITOUS SECURE ELECTRONIC VOTING (u-SEV): Sistema de voto electrónico seguro para entornos sin infraestructuras de telecomunica.

     León Abarca, Olga; Muñoz Tapia, Jose Luis; Soriano Ibáñez, Miguel
    Competitive project

     Share

  • The TAMESIS project: enabling technologies for the health status monitoring and secure exchange of clinical record

     Pegueroles Valles, Josep Rafel; Cruz Llopis, Luis Javier de La; Vera del Campo, Juan; Hernández Serrano, Juan Bautista; León Abarca, Olga
    International Conference on Complex, Intelligent and Software Intensive Systems
    p. 312-319
    DOI: 10.1109/CISIS.2013.57
    Presentation's date: 2013-07
    Presentation of work at congresses

    Read the abstract Read the abstract View View Open in new window  Share Reference managers Reference managers Open in new window

    Personal Health Systems (PHS) allow to move the point of care from hospitals to the patient's home. Moreover, a PHS usually handles much more information and provides more appropriate diagnostic and personalized treatments to individuals. In this paper, we present the objectives, structure and expected innovations of the TAMESIS project. TAMESIS aims to contribute in advancing the state of the art of some of the technologies needed for the development of Personal Health Systems. Specifically, we propose techniques for preventing denial of service, sensor node malfunctioning and traffic injection. In addition, we explore a protocol that makes use of mobile agents for the exchange of medical records between networked databases. As a novel aspect, the protocol will not only support bilateral agreements, already existing in the literature, but multilateral agreements. In reference to clinical data, is critical to preserve the privacy and intimacy of patients. Thus, the data, at the time of being collected as for when it is exchanged, should be processed so as to avoid leakage of information that is not strictly necessary for the parties to fulfill their task correctly. A privacy metric suitable for PHS, and the incorporation of mechanisms needed for privacy and intimacy are also key objectives of this project. Finally, usability aspects of all the system interfaces will be considered.

  • TAMESIS: Tecnologías de Apoyo a la Monitorización del Estado de Salud e Intercambio Seguro de datos médicos

     León Abarca, Olga; Pegueroles Valles, Josep Rafel; Hernández Serrano, Juan Bautista; Cruz Llopis, Luis Javier de La
    Competitive project

     Share

  • Tecnologías de apoyo para la monitorización del estado de salud e intercambio seguro de registros médicos

     Cruz Llopis, Luis Javier de La; León Abarca, Olga; Hernández Serrano, Juan Bautista; Pegueroles Valles, Josep Rafel
    Competitive project

     Share

  • Cooperative detection of primary user emulation attacks in CRNs

     León Abarca, Olga; Hernández Serrano, Juan Bautista; Soriano Ibáñez, Miguel
    Computer networks
    Vol. 56, num. 14, p. 3374-3384
    DOI: 10.1016/j.comnet.2012.05.008
    Date of publication: 2012
    Journal article

    Read the abstract Read the abstract View View Open in new window  Share Reference managers Reference managers Open in new window

    Cognitive radio networks (CRNs) can improve the utilization of the spectrum by making use of licensed spectrum in an opportunistic manner. With such purpose, coexistence mechanisms among CRN nodes or secondary users and legitimate users of the spectrum or primary users are defined. However, due to the particular features of CRNs, new security threats arise, such as the primary user emulation (PUE) attack, which is the most challenging among all. With the aim of detecting such kind of attacks, in this paper we propose a cooperative localization method specifically suited to CRNs which relies on TDoA measurements and Taylor-series estimations. Simulations results show the goodness of the proposed method and its suitability to typical CRN scenarios.

  • Contributions to the Security of Cognitive Radio Networks

     León Abarca, Olga
    Department of Telematics Engineering, Universitat Politècnica de Catalunya
    Theses

     Share Reference managers Reference managers Open in new window

  • Access to the full text
    Modeling the lion attack in cognitive radio networks  Open access

     Hernández Serrano, Juan Bautista; León Abarca, Olga; Soriano Ibáñez, Miguel
    Eurasip journal on wireless communication and networking
    Vol. 2011, p. 1-10
    DOI: 10.1155/2011/242304
    Date of publication: 2011
    Journal article

    Read the abstract Read the abstract Access to the full text Access to the full text Open in new window  Share Reference managers Reference managers Open in new window

    Cognitive radio is a promising technology aiming to improve the utilization of the radio electromagnetic spectrum. A cognitive radio is a smart device which runs radio applications software to perform signal processing. The use of this software enables the device to sense and understand its environment and actively change itsmode of operation based on its observations. Unfortunately, this solution entails new security challenges. In this paper, we present a cross-layer attack to TCP connections in cognitive radio networks, analyze its impact on TCP throughput via analytical model and simulation, and propose potential countermeasures to mitigate it.

  • Access to the full text
    Robust detection of primary user emulation attacks in IEEE 802.22 networks  Open access

     León Abarca, Olga; Hernández Serrano, Juan Bautista; Soriano Ibáñez, Miguel
    International Conference on Cognitive Radio and Advanced Spectrum Management
    DOI: 10.1145/2093256.2093307
    Presentation's date: 2011-10-27
    Presentation of work at congresses

    Read the abstract Read the abstract Access to the full text Access to the full text Open in new window  Share Reference managers Reference managers Open in new window

    Cognitive Radio (CR) technology constitutes a new paradigm where wireless devices can access the spectrum left unused by licensed or primary users in an opportunistic way. This feature opens the door to a main new threat: the Primary User Emulation (PUE) attack, in which a malicious user transmits a fake primary signal preventing a Cognitive Radio Network (CRN) from using the available spectrum. Cooperative location of a primary source can be a valuable tool for distinguishing between a legitimate transmission and a PUE attack whenever the position of primary users is known, as it is the case of TV towers in the IEEE 802.22 standard. However, the location process can be undermined due to false data provided by malicious or faulty nodes. In this paper, we analyze the effect of forged reports on the location process of a given emitter and provide a set of countermeasures in order to make it robust to undesired behaviors.

  • Towards a cooperative intrusion detection system for cognitive radio networks

     León Abarca, Olga; Román, Rodrigo; Hernández Serrano, Juan Bautista
    International Conferences on Networking
    DOI: 10.1007/978-3-642-23041-7_22
    Presentation's date: 2011-05-13
    Presentation of work at congresses

    Read the abstract Read the abstract View View Open in new window  Share Reference managers Reference managers Open in new window

    Cognitive Radio Networks (CRNs) arise as a promising solution to the scarcity of spectrum. By means of cooperation and smart decisions influenced by previous knowledge, CRNs are able to detect and profit from the best spectrum opportunities without interfering primary licensed users. However, besides the well-known attacks to wireless networks, new attacks threat this type of networks. In this paper we analyze these threats and propose a set of intrusion detection modules targeted to detect them. Provided method will allow a CRN to identify attack sources and types of attacks, and to properly react against them.

  • Securing cognitive radio networks

     León Abarca, Olga; Hernández Serrano, Juan Bautista; Soriano Ibáñez, Miguel
    International journal of communication systems
    Vol. 23, num. 5, p. 633-652
    DOI: 10.1002/dac.1102
    Date of publication: 2010-05
    Journal article

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • A new cross-layer attack to TCP in cognitive radio networks

     León Abarca, Olga; Hernández Serrano, Juan Bautista; Soriano Ibáñez, Miguel
    International workshop on cross-layer design
    p. 97-101
    Presentation's date: 2009-06
    Presentation of work at congresses

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • PROVISION SEGURA DE SERVICIOS SOBRE EL P2P (P2PSEC)

     Mata Diaz, Jorge; Pegueroles Valles, Josep Rafel; Fernandez Muñoz, Marcel; León Abarca, Olga; Cruz Llopis, Luis Javier de La; Rico Novella, Francisco Jose; Hernández Serrano, Juan Bautista; Forga Alberich, Jordi; Esparza Martin, Oscar; Martin Faus, Isabel Victoria; Alins Delgado, Juan Jose; Muñoz Tapia, Jose Luis; Soriano Ibáñez, Miguel
    Competitive project

     Share

  • GRUP SEGURETAT DE LA INFORMACIÓ (ISG)

     Pallares Segarra, Esteve; León Abarca, Olga; Hernández Serrano, Juan Bautista; Pegueroles Valles, Josep Rafel; Forné, Jordi; Fernandez Muñoz, Marcel; Esparza Martin, Oscar; Muñoz Tapia, Jose Luis; Parra Arnau, Javier; Soriano Ibáñez, Miguel
    Competitive project

     Share

  • Un nuevo ataque a TCP para redes de radios cognitivas

     León Abarca, Olga; Hernández Serrano, Juan Bautista; Soriano Ibáñez, Miguel
    Jornadas de Ingeniería Telemática1
    p. 83-90
    Presentation's date: 2009-09-15
    Presentation of work at congresses

    Read the abstract Read the abstract View View Open in new window  Share Reference managers Reference managers Open in new window

    Los dispositivos de radios cognitivas emergen como una prometedora tecnología que ha de permitir un mejor uso del espectro electro-magnético. Estos dispositivos se caracterizan por ser capaces de observar y entender su entorno, y cambiar consecuentemente su modo de operación. Sin embargo, estas propiedades “cognitivas” conllevan nuevos retos de seguridad. En este artículo se presenta un nuevo ataque a las conexiones TCP en redes de radios cognitivas, se proponen soluciones para mitigarlo y se evalúa el impacto del mismo con y sin contramedidas.

  • Issues in TCP Vegas over Optical Burst Switching Networks

     León Abarca, Olga
    The 32nd Annual IEEE Conference on Local Computer Networks
    Presentation's date: 2007-10-16
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Issues in TCP Vegas over Optical Burst Switching Networks

     León Abarca, Olga; Sallent Ribes, Sebastia
    The 32nd Annual IEEE Conference on Local Computer Networks
    p. 242-243
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Provisión optima de servicios a redes vehiculares, TSI2006-12507-C03-03

     Cervelló Pastor, Cristina; Agusti Torra, Anna; Guasch Murillo, Daniel; Gutierrez Gonzalez, Luis Maria; León Abarca, Olga; Piney Da Silva, Jose Ramon; Triay Marques, Joan
    Competitive project

     Share

  • Provisión Óptima de Servicios a Redes Vehiculares en Movimiento (POSEIDON)

     Agusti Torra, Anna; Cervelló Pastor, Cristina; Guasch Murillo, Daniel; Gutierrez Gonzalez, Luis Maria; León Abarca, Olga; Ozon Gorriz, Francisco Javier; Piney Da Silva, Jose Ramon; Triay Marques, Joan
    Competitive project

     Share

  • Escalabilidad en redes ópticas IPv6 con Calidad de Servicio

     Cervelló Pastor, Cristina; Agusti Torra, Anna; Guasch Murillo, Daniel; Gutierrez Gonzalez, Luis Maria; León Abarca, Olga; Ozon Gorriz, Francisco Javier; Piney Da Silva, Jose Ramon; Triay Marques, Joan
    Competitive project

     Share

  • Nuevo Protocolo de Encaminamiento para la Mejora de la Supervivencia en Redes Ad Hoc

     Domingo Aladren, Maria Del Carmen; Remondo Bueno, David; León Abarca, Olga
    Jornadas de Ingeniería Telemática
    p. 361-367
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • A Simple Routing Scheme for Improving Ad Hoc Network Survivability

     Domingo Aladren, Maria Del Carmen; Remondo Bueno, David; León Abarca, Olga
    IEEE Global Communications Conference
    p. 1-6
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • On the Extensión of Battery Life with Dynamic Source Routing

     Domingo Aladren, Maria Del Carmen; León Abarca, Olga; Remondo Bueno, David
    EUNICE 2002. Adaptable networks and teleservices
    p. 1-5
    Presentation's date: 2002-10-02
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window